Wired's new Guide to Digital Security is an excellent addition to the genre of simple-to-follow how-tos for reducing the likelihood that you'll be victimized by computer-assisted crime and harassment, and that if you are, the harms will be mitigated.
Like Motherboard's guide, it is formatted as a series of short articles; like EFF's Surveillance Self Defense kit, it is structured around different kinds of threats, with separate paths for "civilians," "public figures" and "spies."
Some of the standout articles:
* Smartphone Security 101: The Steps That Matter Most in which Lily Hay Newman offers "quick and easy steps to make big improvements to your mobile security";
* How to Encrypt All of the Things, where Andy Greenberg shows you "how to keep snoopers out of every facet of your digital life, whether it's video chat or your PC's hard drive";
* How to Sweep For Bugs and Hidden Cameras, where Lily Hay Newman basically shows that unless you're really technologically sophisticated, this is very, very hard;
* and What to Do if You’re Being Doxed, where Newman interviews the Electronic Frontier Foundation's Eva Galperin for really practical advice on what could easily be a nightmare scenario.
Electronic security is a team sport: that's why the Cybersecurity Campaign Playbook has a chapter for how family members of political campaigners should armor themselves against being used as a means to get at their relatives.
This is the ideal season for you to help you up your family's security game. When you go home for the holidays, think about how you can install software, change defaults, and teach your family good practices to help you -- and them -- stay safe.
If this interests you, read EFF's Security Education Companion, which teaches you how to be an effective communicator of security precepts.
The WIRED Guide to Digital Security
A hacker calling themself Light Leafon who claims to be a 14-year-old is responsible for a new IoT worm called Silex that targets any Unix-like system by attempting a login with default credentials; upon gaining access, the malware enumerates all mounted disks and writes to them from /dev/random until they are filled, then it deletes […]
The security firm Cybereason says that it has identified a likely state-sponsored attack on ten global mobile phone networks that they have attributed to "the Chinese-affiliated threat actor APT10," which has been "underway for years."
One of the griftiest corners of late-stage capitalism is the "public safety" industry, in which military contractors realize they can expand their market by peddling overpriced garbage to schools, cities, public transit systems, hospitals, etc -- which is how the "aggression detection" industry emerged, selling microphones whose "machine learning" backends are supposed to be able […]
So you’ve visited the Kennedy Space Center every year. You’ve watched “The Right Stuff” for the 95th time. There must be something to do while you’re waiting to join Space Force for the next manned mission to Mars or the moon. Here’s a combo that should raise a salute from any fan of space or […]
Looking for a new tablet? If you haven’t upgraded in a while, it might be time to check out the latest iPad Pro for two very good reasons. First, the 2018 model is a real workhorse. The 12X Bionic chip processor means it can handle any task you set out for it, and still have […]
You want wireless earbuds to make an impact on your mood and workout, not the environment. If that’s the case, we’ve got a new contender for AirPod market share: Brio Phantom X7 True Wireless Earbuds. The features on these tiny, comfortable buds are impressive even without the environmental angle. Their Bluetooth 5.0 connectivity is good […]